US20170118015A1 - Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device - Google Patents
Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device Download PDFInfo
- Publication number
- US20170118015A1 US20170118015A1 US15/331,309 US201615331309A US2017118015A1 US 20170118015 A1 US20170118015 A1 US 20170118015A1 US 201615331309 A US201615331309 A US 201615331309A US 2017118015 A1 US2017118015 A1 US 2017118015A1
- Authority
- US
- United States
- Prior art keywords
- smart
- identification information
- smart device
- user terminal
- group key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Definitions
- the inventive concept relates to a smart-home field, and more particularly, to a method of managing a smart-home environment by a server, a method of joining the smart-home environment for a smart device, and a method of connecting a communication session with the smart device by a user terminal.
- ICT information communication technology
- Smart-home indicates an intelligent home environment in which a user and household appliances may transmit and receive information and data to/from each other in real time by ICT merged with an existing home environment.
- the smart-home may be divided into home platform technology, wired-wireless network technology, smart device technology, and green-home technology, and a user may receive services such as remote meter reading, control of an air-conditioning system, lighting control, and control of household appliances by accessing the smart-home from the outside using wired-wireless network technology.
- a smart-home environment provides convenience to a user, but there are various security threats since smart devices have a network function.
- a malignant device accesses smart devices through a network function, a new security threat appears as well as existing security threats such as data forgery, an illegal authentication, or a privacy invasion in an existing communication environment.
- secondary damage may also occur due to characteristics of the smart-home. Therefore, solutions for blocking or preventing various security threats which may occur in a smart-home environment are required.
- the inventive concept is directed to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device, thereby blocking various security threats which may occur in the smart-home environment.
- the inventive concept is directed to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device, thereby enhancing the security of the smart-home environment with reduced load compared to a conventional method of blocking security threats.
- a method of managing a smart-home environment by a server includes: receiving identification information and a password of a new smart device from a user terminal; generating a new group key based on the received identification information of the new smart device and identification information of an existing smart device; transmitting the new group key to the existing smart device; receiving identification information and a password from the new smart device; and comparing the identification information and the password received from the new smart device with the identification information and the password received from the user terminal, and transmitting the new group key to the new smart device according to a result of the comparison.
- the method of managing a smart-home environment may further include generating a hash value of the identification information received from the user terminal, and the transmitting the new group key to the new smart device includes transmitting the new group key to the new smart device by encrypting with the generated hash value.
- the transmitting the new group key to the existing smart device may include transmitting the new group key to the existing smart device by encrypting with an existing group key.
- the generating the new group key may include performing an Exclusive OR (XOR) operation of the identification information of the new smart device received from the user terminal and the identification information of the existing smart device.
- XOR Exclusive OR
- the identification information received from the new smart device may be encrypted with a hash value of the identification information of the new smart device
- the method of managing the smart-home environment may further include decoding the encrypted identification information with a hash value of the identification information of the new smart device received from the user terminal.
- the method of managing a smart-home environment by a server may further include: receiving identification information, a password, a request message, and a random number of the user terminal from the user terminal; authenticating the user terminal by comparing pre-stored identification information and password of the user terminal with the identification information and the password of the user terminal received from the user terminal; and when the user terminal is authenticated, transmitting the request message and the random number to smart devices that are members of the smart-home in such a manner that the user terminal and a session between the smart devices that are members of the smart-home are connected to each other.
- the identification information, the request message, and the random number of the user terminal received from the user terminal may be encrypted with a new group key when the new group key is already generated, or encrypted with an existing group key when the new group key is not generated yet.
- the receiving identification information, a password, a request message, and a random number of the user terminal from the user terminal may include: further receiving time information from the user terminal; and authenticating the user terminal when a difference between the received time information and information about an actual time receiving the time information is a preset value or less.
- the method of managing a smart-home environment by a server may further include: deleting identification information and a password of a withdrawing smart device from among pieces of identification information and passwords of smart devices configuring the smart-home environment; regenerating a new group key based on pieces of identification information of the other smart devices excluding the identification information of the withdrawing smart device; and transmitting the regenerated new group key to the other smart devices.
- the transmitting the regenerated new group key may include encrypting the regenerated new group key with each of hash values corresponding to the other smart devices and transmitting the results to the other smart devices, respectively.
- a method of joining a smart-home environment by a smart device includes: transmitting identification information and password of the smart device to a server; receiving an encrypted new group key from the server according to an authentication result based on the identification information and the password of the smart device; and obtaining the new group key by decoding the encrypted new group key with a hash value of the identification information of the smart device.
- a method of connecting a session with a smart device in a smart-home environment by a user terminal includes: transmitting identification information, a password, a request message, and a random number of the user terminal to a server; receiving a random number from a smart device receiving the request message and the random number from the server, according to an authentication result based on the identification information and the password of the user terminal; authenticating the smart device by comparing a random number generated by the user terminal with the random number received from the smart device; and connecting the session with the smart device after the authentication of the smart device is completed.
- the security of the smart-home environment may be enhanced with reduced load compared to a conventional method of blocking security threats.
- FIG. 1 is an exemplary view of a smart-home environment to which methods according to an embodiment of the inventive concept are applied.
- FIG. 2 is a view illustrating a procedure for joining smart-home of a new smart device, according to an embodiment of the inventive concept.
- FIG. 3 is a view illustrating a procedure for connecting a communication session with a smart device of smart-home by a user terminal, according to an embodiment of the inventive concept.
- FIG. 4 is a view illustrating a procedure when a smart device withdraws from a smart-home environment, according to an embodiment of the inventive concept.
- FIG. 5 is a block diagram of a configuration of a server, according to an embodiment of the inventive concept.
- FIGS. 6A and 6B are graphs illustrating efficiency of a method according to an embodiment of the inventive concept compared with the conventional art.
- inventive concept may be variously modified and have various example embodiments, so that specific example embodiments will be illustrated in the drawings and described in the detailed description. However, this does not limit the inventive concept to specific example embodiments, and it should be understood that the inventive concept covers all the modifications, equivalents and replacements included within the idea and technical scope of the inventive concept.
- ⁇ means a unit that processes at least one function or operation and this may be implemented by hardware or software such as a processor, a micro processor, a micro controller, a central processing unit (CPU), a graphics processing unit (GPU), an accelerated Processing unit (APU), a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array (FPGA) or a combination of hardware and software.
- a processor a micro processor, a micro controller, a central processing unit (CPU), a graphics processing unit (GPU), an accelerated Processing unit (APU), a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array (FPGA) or a combination of hardware and software.
- CPU central processing unit
- GPU graphics processing unit
- APU accelerated Processing unit
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- each component to be described below may be provided to be combined to one component or one component may be provided to be divided into two or more components for each more subdivided function.
- each of the respective components to be described below may additionally perform some or all functions among functions which other components take charge of in addition to a primary function which each component takes charge of and some functions among the primary functions which the respective components take charge of are exclusively charged by other components to be performed, of course.
- a smart-home device requires a protector because physical access as well as network access is possible. Furthermore, an attacker may insert malicious software in a smart-home device and may change the use of the smart-home device through malware. If integrity is not guaranteed, the entire smart-home environment may be infected by malware or availability of smart-home environment may be damaged. Therefore, integrity of a smart-home device is necessary.
- the research of Mantoro, etc. has proposed a secure communication between a mobile terminal and a smart device.
- the proposed technique is a system in which a user allocates a public key and a password of a smart device to a mobile terminal and all smart devices and permits access of the smart devices by storing the public key and the password in a database of each smart device.
- the proposed technique is a system safe from man-in-the-middle attacks by performing encryption with a public key.
- passwords and public keys of all smart devices are stored in each smart device, when one of the smart devices is attacked, the entire smart-home environment may be dangerous in addition to data forgery.
- a public key-based authentication of a smart device may lay a burden on the smart device.
- passwords and public keys of all smart devices are stored in each smart device, efficiency is reduced as the number of smart devices in smart-home is increased.
- the research of Park is technique using a public key-based structure with a authentication method of a mobile terminal in a ubiquitous environment.
- the technique includes a process of registering a mobile terminal at a server by a user to get a ticket, and a process of getting an issued ticket.
- a user receives services by submitting a ticket to a plurality of service servers.
- high overhead due to a large amount of computation occurs in the mobile terminal by using a public key algorithm during a process of transmitting an authentication message and a ticket to a user. Therefore, efficiency is reduced in an environment requiring high speed and low power consumption, and computation is also burdened.
- FIG. 1 is an exemplary view of a smart-home environment to which methods according to an embodiment of the inventive concept are applied.
- a smart-home environment may include a user terminal 110 , a server 120 , and one or more smart devices 130 .
- the user terminal 110 may transmit and receive data to/from at least one of the smart devices 130 and the server 120 or may control the smart devices 130 by being connected to the smart-home environment from the outside.
- FIG. 1 shows a mobile terminal such as a smart phone and a tablet personal computer (PC) as the user terminal 110 , but the user terminal 110 is not limited thereto.
- the user terminal 110 may also include a fixed terminal such as a desktop PC, etc.
- the user terminal 110 may be registered at the server 120 in advance to be connected to the smart-home environment (or a smart-home network).
- the server 120 which is a manage entity of the user terminal 110 and the smart devices 130 that are members of smart-home, manages procedures for joining, communicating, and withdrawing with respect to the user terminal 110 and the smart devices 130 .
- the smart devices 130 which are various kinds of devices in the smart-home, may include, for example, household appliances such as a refrigerator, a television (TV), an in-house telephone, lighting, and an audio system.
- the smart devices 130 may have a network function, and thus may communicate with the server 120 and the user terminal 110 .
- FIG. 2 is a view illustrating a procedure for joining smart-home of a new smart device 140, according to an embodiment of the inventive concept.
- the server 120 receives identification information DeviceInfo and a password PW of the new smart device 140 from the user terminal 110 .
- a user may transmit the identification information DeviceInfo and the password PW of the new smart device 140 to be newly joined to the smart-home environment to the server 120 by being connected to the server 120 through the user terminal 110 .
- a user may input the identification information DeviceInfo and the password PW of the new smart device 140 to the server 120 through an input device such as a keyboard or a touch screen connected to the server 120 .
- Identification information DeviceInfo of a smart device may include a specific serial number or device information of the smart device.
- the server 120 generates a hash value H D of the identification information DeviceInfo of the new smart device 140 received from the user terminal 110 .
- the server 120 operates the identification information DeviceInfo of the new smart device 140 and pieces of identification information DeviceInfo 1 , DeviceInfo 2 , . . . , DeviceInfo n of the existing smart devices 130 (for example, an Exclusive OR operation) and generates a new group key GK HOME ′.
- the server 120 transmits the new group key GK HOME ′ to the existing smart devices 130 .
- the server 120 may encrypt the new group key GK HOME ′ with an existing group key GK HOME , in more detail, a group key used in the smart-home before the new group key GK HOME ′ is generated, and may transmit the encrypted group key to the existing smart devices 130 .
- the new smart device 140 transmits its identification information DeviceInfo′ and a password PW′ to the server 120 .
- the new smart device 140 may encrypt the identification information DeviceInfo′ with a hash value H D of the identification information DeviceInfo′, and may transmit the encrypted identification information DeviceInfo′ to the server 120 by concatenating the encrypted identification information DeviceInfo′ with the password PW′.
- the server 120 receives the password PW′ and the encrypted data from the new smart device 140 , and obtains the identification information DeviceInfo′ of the new smart device 140 by decoding the encrypted data with the hash value H D generated in operation ⁇ circle around (2) ⁇ .
- the new smart device 140 is authenticated by comparing the identification information DeviceInfo′ with the identification information DeviceInfo and the password PW received from the user terminal 110 in operation ⁇ circle around (1) ⁇ .
- the server 120 transmits the new group key GK HOME ′ to the new smart device 140 .
- the new group key GK HOME ′ may be encrypted with the hash value H D generated in operation ⁇ circle around (2) ⁇ .
- FIG. 3 is a view illustrating a procedure for connecting a communication session with the smart device 130 of smart-home by the user terminal 110 , according to an embodiment of the inventive concept.
- the user terminal 110 needs to connect a communication session with the smart devices 130 to transmit and receive a message or data by accessing smart-home from the outside.
- the user terminal 110 concatenates a value obtained by encrypting identification information DeviceInfo′ of the user terminal 110 , a request message M, time information T D to block a retransmission attack, and a random number N generated by the user terminal 110 with a group key GK HOME with the password PW′ and transmits the result to the server 120 .
- the group key GK HOME is a group key currently used in the smart-home environment. Accordingly, the group key GK HOME of FIG. 3 may be a new group key GK HOME ′ if the group key GKHOME of FIG. 3 is generated after the new group key GK HOME ′ of FIG.
- the time information T D indicates a time written by the user terminal 110 as a data transmission time of the user terminal 110 .
- the server 120 determines whether a difference between time information T D ′ when data is actually received from the user terminal 110 and the time information T D is a preset value ⁇ T or less according to operation ⁇ circle around (1) ⁇ , and progresses the next operation if the difference satisfies the condition.
- the server 120 authenticates the user terminal 110 by comparing the identification information DeviceInfo′ and the password PW′ received from the user terminal 110 with the pre-stored identification information DeviceInfo and password PW of the user terminal 110 .
- the server 120 transmits a value obtained by encrypting the request message M of a user and the random number N with the group key GK HOME to the smart devices 130 that are members of the smart-home.
- the smart devices 130 receiving encrypted data including the request message M and the random number N may be all of the smart devices 130 of the smart-home or at least one selected from the smart devices 130 .
- the smart devices 130 confirms the request message M of a user, and ⁇ circle around (6) ⁇ transmits a value obtained by encrypting the random number N with the group key GK HOME to the user terminal 110 .
- the user terminal 110 obtains a random number N by decoding data received from the smart devices 130 , and authenticates the smart devices 130 by comparing the obtained random number N with the random number N generated by the user terminal 110 . After the authentication of the smart devices 130 is completed, the user terminal 110 and the smart devices 130 generate a communication session.
- FIG. 4 is a view illustrating a procedure when an arbitrary smart device withdraws from a smart-home environment, according to an embodiment of the inventive concept.
- the server 120 deletes identification information DeviceInfo and a password PW of the withdrawing smart device from among pieces of identification information and passwords of the smart devices 130 forming smart-home.
- the server 120 operates the other pieces of identification information DeviceInfo 1 , DeviceInfo 2 , . . . , DeviceInfo n excluding the identification information DeviceInfo of the withdrawing smart device, and generates a new group key GK HOME ′.
- the server 120 may regenerate a new group key as a smart device withdraws.
- the server 120 encrypts the new group key GK HOME ′ with each of hash values corresponding to the pieces of identification information DeviceInfo 1 , DeviceInfo 2 , . . . , DeviceInfo n of the remaining smart devices 130 excluding the withdrawing smart device, and transmits the results to the remaining smart devices 130 .
- the remaining smart devices 130 deletes a previous group key GK HOME and stores the new group key GK HOME ′.
- the server 120 deletes a previous group key GK HOME .
- FIG. 5 is a block diagram of a configuration of a server 500 , according to an embodiment of the inventive concept.
- the server 500 includes a communicator 510 , a memory 530 , and a controller 550 .
- the communicator 510 , the memory 530 , and the controller 550 may be realized by at least one micro processor.
- the communicator 510 communicates with the user terminal 110 and the smart devices 130 .
- the communicator 510 may transmit and receive identification information, a password, a group key, a request message, or a random number to/from the user terminal 110 and the smart devices 130 .
- the memory 530 stores identification information and passwords of the smart devices 130 that are members of current smart-home, identification information and a password of the user terminal 110 , and a group key being used in the current smart-home.
- the controller 550 controls the communicator 510 and the memory 530 , and may perform various operations such as group key generation, encryption, and decryption. For example, the controller 550 may authenticate the new smart device 140 and the user terminal 110 , and may also generate a new group key according to procedures for joining of the new smart device 140 and withdrawing of a smart device.
- Each of the smart devices 130 and the user terminal 110 may include, although not shown, a communicator, a memory, and a controller in the same manner as in the server 500 of FIG. 5 .
- the communicator of the smart devices 130 is provided to communicate with the server 500 and the user terminal 110 , and the memory stores a group key, identification information and a password of the memory being used in current smart-home, and the controller performs various operations such as hash-value generation, encryption, and decryption while controlling the communicator and the memory.
- the communicator of the user terminal 110 is provided to communicate with the server 500 and the smart devices 130 , and the memory stores a group key, identification information and a password of the memory being used in current smart-home, and the controller performs various operations such as request message generation, random number generation, time information generation, encryption, and decryption while controlling the communicator and the memory.
- Access control An attempt to access unauthorized device should be blocked in advance because a smart-home environment includes personal information and sensitive information. According to an example embodiment of the inventive concept, it is determined whether a device is a device capable of normally accessing smart-home by device identification information. Therefore, an unauthorized device may not access a smart-home environment.
- Device integrity An attacker may insert malicious software in the smart devices 130 , or may change the use of the smart devices 130 through malware and infect a communication network.
- identification information of the smart devices 130 is hashed and thus a hash value is generated and stored. Accordingly, integrity is provided to information of a device added to smart-home or to be changed.
- any of the smart devices 130 not registered at smart-home may not access a smart-home environment.
- it is impossible to know a group key because hash values of all of the smart devices 130 are unknown even if information of the smart devices 130 is obtained.
- the smart devices 130 configuring smart-home may prevent access of an unauthorized smart device by sharing and storing a group key of smart-home.
- FIGS. 6A and 6B are graphs illustrating efficiency of a method according to an embodiment of the inventive concept compared with the conventional art.
- it is efficient to authenticate a smart device based on a group key generated by the server 120 , unlike the research of Mantoro, etc. wherein all devices store information and public keys of smart devices.
- the amount of computation increases when the number of tickets increases as the number of members of a group increases according to the research of Shin, etc., and the research of Park causes high overhead due to a large amount of computation by using a public key-based algorithm.
- it is efficient for the server 120 to generate a group key because the amount of computation does not change even if the number of devices increases.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application claims the benefit of Korean Patent Application No. 10-2015-0148149, filed on Oct. 23, 2015, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein in its entirety by reference.
- 1. Field
- The inventive concept relates to a smart-home field, and more particularly, to a method of managing a smart-home environment by a server, a method of joining the smart-home environment for a smart device, and a method of connecting a communication session with the smart device by a user terminal.
- 2. Description of the Related Art
- Recently, use of smart devices is popularized as information communication technology (ICT) is developing. Accordingly, services with respect to smart-home, smart healthcare, and smart medical treatment capable of being connected to the smart devices are provided.
- Smart-home indicates an intelligent home environment in which a user and household appliances may transmit and receive information and data to/from each other in real time by ICT merged with an existing home environment. The smart-home may be divided into home platform technology, wired-wireless network technology, smart device technology, and green-home technology, and a user may receive services such as remote meter reading, control of an air-conditioning system, lighting control, and control of household appliances by accessing the smart-home from the outside using wired-wireless network technology.
- A smart-home environment provides convenience to a user, but there are various security threats since smart devices have a network function. When a malignant device accesses smart devices through a network function, a new security threat appears as well as existing security threats such as data forgery, an illegal authentication, or a privacy invasion in an existing communication environment. Furthermore, secondary damage may also occur due to characteristics of the smart-home. Therefore, solutions for blocking or preventing various security threats which may occur in a smart-home environment are required.
- The inventive concept is directed to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device, thereby blocking various security threats which may occur in the smart-home environment.
- Furthermore, the inventive concept is directed to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device, thereby enhancing the security of the smart-home environment with reduced load compared to a conventional method of blocking security threats.
- According to an aspect of an embodiment, a method of managing a smart-home environment by a server includes: receiving identification information and a password of a new smart device from a user terminal; generating a new group key based on the received identification information of the new smart device and identification information of an existing smart device; transmitting the new group key to the existing smart device; receiving identification information and a password from the new smart device; and comparing the identification information and the password received from the new smart device with the identification information and the password received from the user terminal, and transmitting the new group key to the new smart device according to a result of the comparison.
- In an example embodiment, the method of managing a smart-home environment may further include generating a hash value of the identification information received from the user terminal, and the transmitting the new group key to the new smart device includes transmitting the new group key to the new smart device by encrypting with the generated hash value.
- In an example embodiment, the transmitting the new group key to the existing smart device may include transmitting the new group key to the existing smart device by encrypting with an existing group key.
- In an example embodiment, the generating the new group key may include performing an Exclusive OR (XOR) operation of the identification information of the new smart device received from the user terminal and the identification information of the existing smart device.
- In an example embodiment, the identification information received from the new smart device may be encrypted with a hash value of the identification information of the new smart device, and the method of managing the smart-home environment may further include decoding the encrypted identification information with a hash value of the identification information of the new smart device received from the user terminal.
- In an example embodiment, the method of managing a smart-home environment by a server may further include: receiving identification information, a password, a request message, and a random number of the user terminal from the user terminal; authenticating the user terminal by comparing pre-stored identification information and password of the user terminal with the identification information and the password of the user terminal received from the user terminal; and when the user terminal is authenticated, transmitting the request message and the random number to smart devices that are members of the smart-home in such a manner that the user terminal and a session between the smart devices that are members of the smart-home are connected to each other.
- In an example embodiment, the identification information, the request message, and the random number of the user terminal received from the user terminal may be encrypted with a new group key when the new group key is already generated, or encrypted with an existing group key when the new group key is not generated yet.
- In an example embodiment, the receiving identification information, a password, a request message, and a random number of the user terminal from the user terminal may include: further receiving time information from the user terminal; and authenticating the user terminal when a difference between the received time information and information about an actual time receiving the time information is a preset value or less.
- In an example embodiment, the method of managing a smart-home environment by a server may further include: deleting identification information and a password of a withdrawing smart device from among pieces of identification information and passwords of smart devices configuring the smart-home environment; regenerating a new group key based on pieces of identification information of the other smart devices excluding the identification information of the withdrawing smart device; and transmitting the regenerated new group key to the other smart devices.
- In an example embodiment, the transmitting the regenerated new group key may include encrypting the regenerated new group key with each of hash values corresponding to the other smart devices and transmitting the results to the other smart devices, respectively.
- According to an aspect of another embodiment, a method of joining a smart-home environment by a smart device includes: transmitting identification information and password of the smart device to a server; receiving an encrypted new group key from the server according to an authentication result based on the identification information and the password of the smart device; and obtaining the new group key by decoding the encrypted new group key with a hash value of the identification information of the smart device.
- According to an aspect of another embodiment, a method of connecting a session with a smart device in a smart-home environment by a user terminal includes: transmitting identification information, a password, a request message, and a random number of the user terminal to a server; receiving a random number from a smart device receiving the request message and the random number from the server, according to an authentication result based on the identification information and the password of the user terminal; authenticating the smart device by comparing a random number generated by the user terminal with the random number received from the smart device; and connecting the session with the smart device after the authentication of the smart device is completed.
- According to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device according to the inventive concept, various security threats which may occur in the smart-home environment may be blocked.
- Furthermore, according to a method of managing a smart-home environment, a method of joining the smart-home environment, and a method of connecting a communication session with a smart device according to the inventive concept, the security of the smart-home environment may be enhanced with reduced load compared to a conventional method of blocking security threats.
- These and/or other aspects will become apparent and more readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is an exemplary view of a smart-home environment to which methods according to an embodiment of the inventive concept are applied. -
FIG. 2 is a view illustrating a procedure for joining smart-home of a new smart device, according to an embodiment of the inventive concept. -
FIG. 3 is a view illustrating a procedure for connecting a communication session with a smart device of smart-home by a user terminal, according to an embodiment of the inventive concept. -
FIG. 4 is a view illustrating a procedure when a smart device withdraws from a smart-home environment, according to an embodiment of the inventive concept. -
FIG. 5 is a block diagram of a configuration of a server, according to an embodiment of the inventive concept. -
FIGS. 6A and 6B are graphs illustrating efficiency of a method according to an embodiment of the inventive concept compared with the conventional art. - The inventive concept may be variously modified and have various example embodiments, so that specific example embodiments will be illustrated in the drawings and described in the detailed description. However, this does not limit the inventive concept to specific example embodiments, and it should be understood that the inventive concept covers all the modifications, equivalents and replacements included within the idea and technical scope of the inventive concept.
- In describing the inventive concept, in the following description, a detailed explanation of known related technologies may be omitted to avoid unnecessarily obscuring the subject matter of the inventive concept. In addition, numeral figures (for example, 1, 2, and the like) used during describing the specification are just identification symbols for distinguishing one element from another element.
- Further, in the specification, if it is described that one component is “connected” or “accesses” the other component, it is understood that the one component may be directly connected to or may directly access the other component but unless explicitly described to the contrary, another component may be “connected” or “access” between the components.
- In addition, terms including “unit”, “er”, “or”, “module”, and the like disclosed in the specification mean a unit that processes at least one function or operation and this may be implemented by hardware or software such as a processor, a micro processor, a micro controller, a central processing unit (CPU), a graphics processing unit (GPU), an accelerated Processing unit (APU), a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array (FPGA) or a combination of hardware and software.
- Moreover, it is intended to be clarified that distinguishing components in the specification just distinguishing the components for each primary function which each component takes charge of. That is, two or more components to be described below may be provided to be combined to one component or one component may be provided to be divided into two or more components for each more subdivided function. In addition, each of the respective components to be described below may additionally perform some or all functions among functions which other components take charge of in addition to a primary function which each component takes charge of and some functions among the primary functions which the respective components take charge of are exclusively charged by other components to be performed, of course.
- As described above, there are various security threats in a smart-home environment, and security requirements for the smart-home environment to block the various security threats are as below.
- (1) Data Confidentiality
- In a smart-home environment, pieces of sensitive information such as personal information and control messages which may violate privacy are transmitted through a network. Therefore, data needs to be encrypted and transmitted and received during communication in such a manner that an unauthorized third party cannot read data.
- (2) Access Control
- In a smart-home environment, all access authority such as reading and modifying of data needs to be distinguished. An attempt to access an unauthorized device should be blocked in advance to prevent security threats.
- (3) Device Integrity
- A smart-home device requires a protector because physical access as well as network access is possible. Furthermore, an attacker may insert malicious software in a smart-home device and may change the use of the smart-home device through malware. If integrity is not guaranteed, the entire smart-home environment may be infected by malware or availability of smart-home environment may be damaged. Therefore, integrity of a smart-home device is necessary.
- (4) Device Authentication
- Many smart devices are used without considering security, and unauthenticated smart devices may access through a wireless network. When a discarded or copied smart device accesses, the smart device may be maliciously used to insert malware or contaminate a smart-home environment. Furthermore, when an attacker disguises the discarded or copied smart device as a normal device, normal use of a user may be impossible. Therefore, an authentication of a smart device is necessary.
- There are various conventional techniques to satisfy the security requirements as above, but each of the conventional techniques has some disadvantages. Conventional techniques and disadvantages thereof are as below.
- (1) Research of Mantoro, etc. (Mantoro, T., Adnan, M. A. M., Ayu, and M. A., “Secured communication between mobile devices and smart-home appliances,” Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, pp. 429-434, December 2013.
- The research of Mantoro, etc. has proposed a secure communication between a mobile terminal and a smart device. The proposed technique is a system in which a user allocates a public key and a password of a smart device to a mobile terminal and all smart devices and permits access of the smart devices by storing the public key and the password in a database of each smart device. The proposed technique is a system safe from man-in-the-middle attacks by performing encryption with a public key. However, since passwords and public keys of all smart devices are stored in each smart device, when one of the smart devices is attacked, the entire smart-home environment may be dangerous in addition to data forgery. Furthermore, a public key-based authentication of a smart device may lay a burden on the smart device. In addition, since passwords and public keys of all smart devices are stored in each smart device, efficiency is reduced as the number of smart devices in smart-home is increased.
- (2) Research of Shin, etc. (Soo-bok Shin, Hong-jin Yeh, and Kang-seok Kim, “A ticket based authentication scheme for group communication,” In Proceedings of The 2012 International Conference on Information Security and Assurance, pp.152-155, April 2012.
- Research of Shin, etc. has proposed authentication technique for a group communication in a ubiquitous environment. According to the proposed technique, a user gets a ticket for connecting sessions and connects the sessions to each other with the ticket. An authentication of a smart device by a ticket is efficient because operations of a smart device are minimized. However, data forgery and a retransmission attack are possible since there is no process for verifying device integrity. In this case, the entire smart-home environment may be dangerous when a malignant device accesses. Furthermore, efficiency may be reduced when the number of tickets increases as the number of devices of a group to be managed increases.
- (3) Research of Park (Jong-hyuk Park, “An authentication protocol offering service anonymity of mobile device in ubiquitous environment,” The Journal of Supercomputing, vol 62, no.1, pp.105-117, October.
- The research of Park is technique using a public key-based structure with a authentication method of a mobile terminal in a ubiquitous environment. The technique includes a process of registering a mobile terminal at a server by a user to get a ticket, and a process of getting an issued ticket. A user receives services by submitting a ticket to a plurality of service servers. However, high overhead due to a large amount of computation occurs in the mobile terminal by using a public key algorithm during a process of transmitting an authentication message and a ticket to a user. Therefore, efficiency is reduced in an environment requiring high speed and low power consumption, and computation is also burdened.
- Hereinafter, various example embodiments of the inventive concept, for example, a procedure for joining a new smart device, a procedure for connecting a communication session with a user terminal, and a procedure for withdrawing of a smart device, will be described referring to
FIGS. 1 through 6 . In this regard, definitions of notations used in the present specification are as below Table 1. -
TABLE 1 Notation Description DeviceInfo The smart home device's information DeviceInfo′ The smart home device's information authentication requested PW The smart home device's password PW′ The smart home device's password authentication requested GKHome The smart home's group key GKHome′ The new smart home's group key H(•) Hash function HD Hash value of smart home device's information M User message ⊕ XOR operation N Random number TD Time stamp of smart home device ΔT Valid time interval for transmission delay -
FIG. 1 is an exemplary view of a smart-home environment to which methods according to an embodiment of the inventive concept are applied. - Referring to
FIG. 1 , a smart-home environment according to an embodiment of the inventive concept may include auser terminal 110, aserver 120, and one or moresmart devices 130. - The
user terminal 110 may transmit and receive data to/from at least one of thesmart devices 130 and theserver 120 or may control thesmart devices 130 by being connected to the smart-home environment from the outside. -
FIG. 1 shows a mobile terminal such as a smart phone and a tablet personal computer (PC) as theuser terminal 110, but theuser terminal 110 is not limited thereto. For example, theuser terminal 110 may also include a fixed terminal such as a desktop PC, etc. - The
user terminal 110 may be registered at theserver 120 in advance to be connected to the smart-home environment (or a smart-home network). - The
server 120, which is a manage entity of theuser terminal 110 and thesmart devices 130 that are members of smart-home, manages procedures for joining, communicating, and withdrawing with respect to theuser terminal 110 and thesmart devices 130. - The
smart devices 130, which are various kinds of devices in the smart-home, may include, for example, household appliances such as a refrigerator, a television (TV), an in-house telephone, lighting, and an audio system. Thesmart devices 130 may have a network function, and thus may communicate with theserver 120 and theuser terminal 110. -
FIG. 2 is a view illustrating a procedure for joining smart-home of a newsmart device 140, according to an embodiment of the inventive concept. - {circle around (1)} The
server 120 receives identification information DeviceInfo and a password PW of the newsmart device 140 from theuser terminal 110. A user may transmit the identification information DeviceInfo and the password PW of the newsmart device 140 to be newly joined to the smart-home environment to theserver 120 by being connected to theserver 120 through theuser terminal 110. According to an embodiment, a user may input the identification information DeviceInfo and the password PW of the newsmart device 140 to theserver 120 through an input device such as a keyboard or a touch screen connected to theserver 120. Identification information DeviceInfo of a smart device may include a specific serial number or device information of the smart device. - {circle around (2)} The
server 120 generates a hash value HD of the identification information DeviceInfo of the newsmart device 140 received from theuser terminal 110. - {circle around (3)} The
server 120 operates the identification information DeviceInfo of the newsmart device 140 and pieces of identification information DeviceInfo1, DeviceInfo2, . . . , DeviceInfon of the existing smart devices 130 (for example, an Exclusive OR operation) and generates a new group key GKHOME′. - {circle around (4)} The
server 120 transmits the new group key GKHOME′ to the existingsmart devices 130. Here, theserver 120 may encrypt the new group key GKHOME′ with an existing group key GKHOME, in more detail, a group key used in the smart-home before the new group key GKHOME′ is generated, and may transmit the encrypted group key to the existingsmart devices 130. - {circle around (5)} The new
smart device 140 transmits its identification information DeviceInfo′ and a password PW′ to theserver 120. Here, the newsmart device 140 may encrypt the identification information DeviceInfo′ with a hash value HD of the identification information DeviceInfo′, and may transmit the encrypted identification information DeviceInfo′ to theserver 120 by concatenating the encrypted identification information DeviceInfo′ with the password PW′. - {circle around (6)} The
server 120 receives the password PW′ and the encrypted data from the newsmart device 140, and obtains the identification information DeviceInfo′ of the newsmart device 140 by decoding the encrypted data with the hash value HD generated in operation {circle around (2)}. The newsmart device 140 is authenticated by comparing the identification information DeviceInfo′ with the identification information DeviceInfo and the password PW received from theuser terminal 110 in operation {circle around (1)}. - {circle around (7)} If the identification information DeviceInfo′ and the password PW′ obtained from the new
smart device 140 is equal to the identification information DeviceInfo and the password PW received from theuser terminal 110, the authentication of the newsmart device 140 is determined to be successful and theserver 120 transmits the new group key GKHOME′ to the newsmart device 140. Here, the new group key GKHOME′ may be encrypted with the hash value HD generated in operation {circle around (2)}. -
FIG. 3 is a view illustrating a procedure for connecting a communication session with thesmart device 130 of smart-home by theuser terminal 110, according to an embodiment of the inventive concept. - The
user terminal 110 needs to connect a communication session with thesmart devices 130 to transmit and receive a message or data by accessing smart-home from the outside. - {circle around (1)} The
user terminal 110 concatenates a value obtained by encrypting identification information DeviceInfo′ of theuser terminal 110, a request message M, time information TD to block a retransmission attack, and a random number N generated by theuser terminal 110 with a group key GKHOME with the password PW′ and transmits the result to theserver 120. Here, the group key GKHOME is a group key currently used in the smart-home environment. Accordingly, the group key GKHOME ofFIG. 3 may be a new group key GKHOME′ if the group key GKHOME ofFIG. 3 is generated after the new group key GKHOME′ ofFIG. 2 is generated, or may be a previous group key GKHOME if the group key GKHOME ofFIG. 3 is generated before the new group key GKHOME′ ofFIG. 2 is generated. Furthermore, the time information TD indicates a time written by theuser terminal 110 as a data transmission time of theuser terminal 110. - {circle around (2)} The
server 120, to confirm effectiveness, determines whether a difference between time information TD′ when data is actually received from theuser terminal 110 and the time information TD is a preset value ΔT or less according to operation {circle around (1)}, and progresses the next operation if the difference satisfies the condition. - {circle around (3)} When a difference between TD′ and TD is a preset value ΔT or less, the
server 120 authenticates theuser terminal 110 by comparing the identification information DeviceInfo′ and the password PW′ received from theuser terminal 110 with the pre-stored identification information DeviceInfo and password PW of theuser terminal 110. - {circle around (4)} When the authentication of the
user terminal 110 is successful, theserver 120 transmits a value obtained by encrypting the request message M of a user and the random number N with the group key GKHOME to thesmart devices 130 that are members of the smart-home. Thesmart devices 130 receiving encrypted data including the request message M and the random number N may be all of thesmart devices 130 of the smart-home or at least one selected from thesmart devices 130. - {circle around (5)} The
smart devices 130 confirms the request message M of a user, and {circle around (6)} transmits a value obtained by encrypting the random number N with the group key GKHOME to theuser terminal 110. - {circle around (7)} The
user terminal 110 obtains a random number N by decoding data received from thesmart devices 130, and authenticates thesmart devices 130 by comparing the obtained random number N with the random number N generated by theuser terminal 110. After the authentication of thesmart devices 130 is completed, theuser terminal 110 and thesmart devices 130 generate a communication session. -
FIG. 4 is a view illustrating a procedure when an arbitrary smart device withdraws from a smart-home environment, according to an embodiment of the inventive concept. - {circle around (1)} When the arbitrary smart device withdraws from the smart-home environment because the arbitrary smart device may not provide services due to deterioration and a breakdown, the
server 120 deletes identification information DeviceInfo and a password PW of the withdrawing smart device from among pieces of identification information and passwords of thesmart devices 130 forming smart-home. - {circle around (2)} The
server 120 operates the other pieces of identification information DeviceInfo1, DeviceInfo2, . . . , DeviceInfon excluding the identification information DeviceInfo of the withdrawing smart device, and generates a new group key GKHOME′. With reference toFIG. 2 , when the new group key GKHOME′ is already generated as the newsmart device 140 is joined, theserver 120 may regenerate a new group key as a smart device withdraws. - {circle around (3)} The
server 120 encrypts the new group key GKHOME′ with each of hash values corresponding to the pieces of identification information DeviceInfo1, DeviceInfo2, . . . , DeviceInfon of the remainingsmart devices 130 excluding the withdrawing smart device, and transmits the results to the remainingsmart devices 130. - {circle around (4)} The remaining
smart devices 130 deletes a previous group key GKHOME and stores the new group key GKHOME′. - {circle around (5)} The
server 120 deletes a previous group key GKHOME. -
FIG. 5 is a block diagram of a configuration of aserver 500, according to an embodiment of the inventive concept. - Referring to
FIG. 5 , theserver 500 according to an embodiment of the inventive concept includes acommunicator 510, amemory 530, and acontroller 550. Thecommunicator 510, thememory 530, and thecontroller 550 may be realized by at least one micro processor. - The
communicator 510 communicates with theuser terminal 110 and thesmart devices 130. Thecommunicator 510 may transmit and receive identification information, a password, a group key, a request message, or a random number to/from theuser terminal 110 and thesmart devices 130. - The
memory 530 stores identification information and passwords of thesmart devices 130 that are members of current smart-home, identification information and a password of theuser terminal 110, and a group key being used in the current smart-home. - The
controller 550 controls thecommunicator 510 and thememory 530, and may perform various operations such as group key generation, encryption, and decryption. For example, thecontroller 550 may authenticate the newsmart device 140 and theuser terminal 110, and may also generate a new group key according to procedures for joining of the newsmart device 140 and withdrawing of a smart device. - Each of the
smart devices 130 and theuser terminal 110 may include, although not shown, a communicator, a memory, and a controller in the same manner as in theserver 500 ofFIG. 5 . - The communicator of the
smart devices 130 is provided to communicate with theserver 500 and theuser terminal 110, and the memory stores a group key, identification information and a password of the memory being used in current smart-home, and the controller performs various operations such as hash-value generation, encryption, and decryption while controlling the communicator and the memory. - The communicator of the
user terminal 110 is provided to communicate with theserver 500 and thesmart devices 130, and the memory stores a group key, identification information and a password of the memory being used in current smart-home, and the controller performs various operations such as request message generation, random number generation, time information generation, encryption, and decryption while controlling the communicator and the memory. - Hereinabove, a procedure for joining a smart-home environment, a procedure for connecting a communication session, and a procedure for withdrawing are described. Safety and efficiency of smart-home according to the described procedures are as below.
- (1) Safety
- 1) Confidentiality—The
smart devices 130 needs to be guaranteed with confidentiality because thesmart devices 130 include sensitive information such as personal information and control messages which may violate privacy. According to an example embodiment of the inventive concept, since a group key is distributed by a hash value of thesmart devices 130, a device not registered at theserver 120 may not decode the group key. Furthermore, a group key of smart-home may not be decoded because, even if one of thesmart devices 130 is leaked, it is impossible to know information of the other devices. Furthermore, data confidentiality is provided by transmitting and receiving data by encrypting through a group key. - 2) Access control—An attempt to access unauthorized device should be blocked in advance because a smart-home environment includes personal information and sensitive information. According to an example embodiment of the inventive concept, it is determined whether a device is a device capable of normally accessing smart-home by device identification information. Therefore, an unauthorized device may not access a smart-home environment.
- 3) Device integrity—An attacker may insert malicious software in the
smart devices 130, or may change the use of thesmart devices 130 through malware and infect a communication network. According to an example embodiment of the inventive concept, identification information of thesmart devices 130 is hashed and thus a hash value is generated and stored. Accordingly, integrity is provided to information of a device added to smart-home or to be changed. In addition, any of thesmart devices 130 not registered at smart-home may not access a smart-home environment. Furthermore, it is impossible to know a group key because hash values of all of thesmart devices 130 are unknown even if information of thesmart devices 130 is obtained. - 4) Device authentication—Zombie smart devices inserting malware by accessing smart-home, sending a malicious e-mail, or generating Distributed Denial of Service (DDoS) attacks have increased. According to an example embodiment of the inventive concept, the
smart devices 130 configuring smart-home may prevent access of an unauthorized smart device by sharing and storing a group key of smart-home. - (2) Efficiency
-
FIGS. 6A and 6B are graphs illustrating efficiency of a method according to an embodiment of the inventive concept compared with the conventional art. According to an example embodiment of the inventive concept, as illustrated inFIGS. 6A and 6B , it is efficient to authenticate a smart device based on a group key generated by theserver 120, unlike the research of Mantoro, etc. wherein all devices store information and public keys of smart devices. Furthermore, the amount of computation increases when the number of tickets increases as the number of members of a group increases according to the research of Shin, etc., and the research of Park causes high overhead due to a large amount of computation by using a public key-based algorithm. However, according to an example embodiment of the inventive concept, it is efficient for theserver 120 to generate a group key because the amount of computation does not change even if the number of devices increases. - Hereinabove, the inventive concept has been described with reference to the preferred embodiments of the inventive concept. However, it will be appreciated by those skilled in the art that various modifications and changes of the inventive concept can be made without departing from the spirit and the scope of the inventive concept which are defined in the appended claims and their equivalents.
Claims (12)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2015-0148149 | 2015-10-23 | ||
KR1020150148149A KR101753859B1 (en) | 2015-10-23 | 2015-10-23 | Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20170118015A1 true US20170118015A1 (en) | 2017-04-27 |
US10594479B2 US10594479B2 (en) | 2020-03-17 |
Family
ID=58559259
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/331,309 Active 2037-02-15 US10594479B2 (en) | 2015-10-23 | 2016-10-21 | Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device |
Country Status (2)
Country | Link |
---|---|
US (1) | US10594479B2 (en) |
KR (1) | KR101753859B1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190372836A1 (en) * | 2018-05-31 | 2019-12-05 | Verizon Patent And Licensing Inc. | System and method for managing devices in a local network |
CN110798307A (en) * | 2019-10-30 | 2020-02-14 | 武汉极意网络科技有限公司 | Method, device and equipment for marking distributed anti-crawler user equipment and storage medium |
CN111859317A (en) * | 2020-06-08 | 2020-10-30 | 北京多润经贸有限公司 | A kind of intelligent equipment management method and system |
US20210029543A1 (en) * | 2018-03-21 | 2021-01-28 | Samsung Electronics Co., Ltd. | Method and device for authenticating device using wireless lan service |
US20210297856A1 (en) * | 2020-03-23 | 2021-09-23 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Communication system |
CN113472728A (en) * | 2020-03-31 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Communication method and device |
US20220141041A1 (en) * | 2019-04-01 | 2022-05-05 | Intel Corporation | Privacy protected autonomous attestation |
CN114710299A (en) * | 2022-06-07 | 2022-07-05 | 杭州雅观科技有限公司 | Lightweight authentication method suitable for cloud LED lighting energy-saving system |
CN116055237A (en) * | 2022-12-27 | 2023-05-02 | 广州朗国电子科技股份有限公司 | Smart home networking method, smart home networking system, electronic equipment and medium |
CN116366348A (en) * | 2023-03-28 | 2023-06-30 | 深圳市麦驰信息技术有限公司 | Smart home access authorization method and system |
WO2024060696A1 (en) * | 2022-09-20 | 2024-03-28 | 贵州电网有限责任公司 | Tee-based smart home remote control method and related apparatus |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101968417B1 (en) | 2017-10-26 | 2019-04-11 | 순천향대학교 산학협력단 | Message security transmission system in smart home service system and method thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162750A1 (en) * | 2005-12-01 | 2007-07-12 | Hartmut Konig | Method for changing a group key in a group of network elements in a network system |
KR100970318B1 (en) * | 2007-09-28 | 2010-07-15 | 한국전력공사 | Security key setting method of power meter communication based integrated meter reading service |
KR20140045829A (en) * | 2012-10-09 | 2014-04-17 | 에스케이텔레콤 주식회사 | Method for providing authentication for iot, device and apparatus therefor |
US20150186611A1 (en) * | 2012-05-18 | 2015-07-02 | Stryker Corporation | Patient support with data communication |
KR101537097B1 (en) * | 2008-03-10 | 2015-07-15 | 주식회사 케이티 | One-time password authentication method and authentication system using SM |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
-
2015
- 2015-10-23 KR KR1020150148149A patent/KR101753859B1/en active Active
-
2016
- 2016-10-21 US US15/331,309 patent/US10594479B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162750A1 (en) * | 2005-12-01 | 2007-07-12 | Hartmut Konig | Method for changing a group key in a group of network elements in a network system |
KR100970318B1 (en) * | 2007-09-28 | 2010-07-15 | 한국전력공사 | Security key setting method of power meter communication based integrated meter reading service |
KR101537097B1 (en) * | 2008-03-10 | 2015-07-15 | 주식회사 케이티 | One-time password authentication method and authentication system using SM |
US20150186611A1 (en) * | 2012-05-18 | 2015-07-02 | Stryker Corporation | Patient support with data communication |
KR20140045829A (en) * | 2012-10-09 | 2014-04-17 | 에스케이텔레콤 주식회사 | Method for providing authentication for iot, device and apparatus therefor |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
Non-Patent Citations (1)
Title |
---|
Dae Sung Choi et al - An Group-based Security Protocol for Machine Type Communications in LTE-Advanced * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210029543A1 (en) * | 2018-03-21 | 2021-01-28 | Samsung Electronics Co., Ltd. | Method and device for authenticating device using wireless lan service |
US12250539B2 (en) * | 2018-03-21 | 2025-03-11 | Samsung Electronics Co., Ltd. | Method and device for authenticating device using wireless LAN service |
US10756965B2 (en) * | 2018-05-31 | 2020-08-25 | Verizon Patent And Licensing Inc. | System and method for managing devices in a local network |
US20190372836A1 (en) * | 2018-05-31 | 2019-12-05 | Verizon Patent And Licensing Inc. | System and method for managing devices in a local network |
US20220141041A1 (en) * | 2019-04-01 | 2022-05-05 | Intel Corporation | Privacy protected autonomous attestation |
US12034873B2 (en) * | 2019-04-01 | 2024-07-09 | Intel Corporation | Privacy protected autonomous attestation |
CN110798307A (en) * | 2019-10-30 | 2020-02-14 | 武汉极意网络科技有限公司 | Method, device and equipment for marking distributed anti-crawler user equipment and storage medium |
US11743725B2 (en) * | 2020-03-23 | 2023-08-29 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Communication system |
US20210297856A1 (en) * | 2020-03-23 | 2021-09-23 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Communication system |
CN113472728A (en) * | 2020-03-31 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Communication method and device |
CN111859317A (en) * | 2020-06-08 | 2020-10-30 | 北京多润经贸有限公司 | A kind of intelligent equipment management method and system |
CN114710299A (en) * | 2022-06-07 | 2022-07-05 | 杭州雅观科技有限公司 | Lightweight authentication method suitable for cloud LED lighting energy-saving system |
WO2024060696A1 (en) * | 2022-09-20 | 2024-03-28 | 贵州电网有限责任公司 | Tee-based smart home remote control method and related apparatus |
CN116055237A (en) * | 2022-12-27 | 2023-05-02 | 广州朗国电子科技股份有限公司 | Smart home networking method, smart home networking system, electronic equipment and medium |
CN116366348A (en) * | 2023-03-28 | 2023-06-30 | 深圳市麦驰信息技术有限公司 | Smart home access authorization method and system |
Also Published As
Publication number | Publication date |
---|---|
US10594479B2 (en) | 2020-03-17 |
KR20170047717A (en) | 2017-05-08 |
KR101753859B1 (en) | 2017-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10594479B2 (en) | Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device | |
US10693848B2 (en) | Installation of a terminal in a secure system | |
Kaur et al. | A secure two‐factor authentication framework in cloud computing | |
Nyangaresi et al. | Trusted authority based session key agreement and authentication algorithm for smart grid networks | |
EP3205048B1 (en) | Generating a symmetric encryption key | |
Li et al. | An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments | |
US20130227286A1 (en) | Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud | |
US11438316B2 (en) | Sharing encrypted items with participants verification | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
Noh et al. | Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks | |
US11240661B2 (en) | Secure simultaneous authentication of equals anti-clogging mechanism | |
CN110519222B (en) | External network access identity authentication method and system based on disposable asymmetric key pair and key fob | |
Truong et al. | Improved Chebyshev Polynomials‐Based Authentication Scheme in Client‐Server Environment | |
US20240305607A1 (en) | Authentication procedure in a virtual private network | |
KR102539418B1 (en) | Apparatus and method for mutual authentication based on physical unclonable function | |
CN114553566B (en) | Data encryption method, device, equipment and storage medium | |
Sun et al. | DNA-X: Dynamic network authentication using SGX | |
Tsai et al. | Cloud encryption using distributed environmental keys | |
US20240064012A1 (en) | Authentication cryptography operations, exchanges and signatures | |
US20240048559A1 (en) | Rendering endpoint connection without authentication dark on network | |
Park et al. | OTP Authentication Module and Authentication Certificate Based User Authenticating Technique for Direct Access to Home Network and Resource Management | |
CN119071038A (en) | Single sign-on method, system, device, equipment and medium based on quantum key | |
Khan et al. | Modified anonymous authentication scheme with enhanced security for wireless communication | |
Hsieh et al. | An Improved Mutual Authentication Mechanism for Securing Smart Phones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AJOU UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KWAK, JIN;RYU, HO SEOK;REEL/FRAME:040260/0288 Effective date: 20161021 Owner name: AJOU UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUNDATION, KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KWAK, JIN;RYU, HO SEOK;REEL/FRAME:040260/0288 Effective date: 20161021 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |